What is the basic architecture of EAP?
Extensible Authentication Protocol (EAP):
- Supplicant
- Authenticator
- EAP server
How is an EAP message structured?
How does EAP-TLS work?
Handshake:
- Server initiates EAP-TLS
- Supplicant sends “Client Hello” with supported algorithms, Client-DH and Client Rand
- Server computes Master Secret
- Server sends “Server Hello” with selected algorithms, server-DH, server rand + encrypted and integrity protected: Certificate Request, Server Certificate, Certificate verify, Finished
- Client checks Certificate Verify with Server Certificate
- Client computes Master Secret
- Client sends encrypted and integrity protected: Client certificate, Client verify, Finished
- Server checks Client verify with Client certificate
What is EAP-TTLS? How can it be attacked?
On EAP-TTLS with Pap:
Evil Twin with fake certificate:
- If MD doesnt check certificate or attacker has an certificate from the same root certificate
- Attacker obtains username/ password
How does EAP-TTLS with MSChapv2 work?
Why is a EMSK needed in EAP?
EAP re-authentication:
- Large Network with roaming (e.g. eduroam) have multiple networks with local EAP server and a home EAP server.
- Local EAP server acts as a proxy
- To avoid re-authentication with home EAP server EMSK is saved on local EAP server
- Used to derive future MSKs
How is EAP re-authentication done?